securing the threats of tomorrow, today! securing the threats of tomorrow, today! 27 september 2018...

12
Securing the threats of tomorrow, Today! 27 September 2018 Lubomir Tilev Security Sales Leader Bulgaria and Romania

Upload: others

Post on 27-Jun-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Securing the threats of tomorrow, Today! Securing the threats of tomorrow, Today! 27 September 2018 Lubomir Tilev Security Sales Leader Bulgaria and Romania . 2 IBM Security Look familiar?

Securing the threats of

tomorrow, Today!

27 September 2018

Lubomir Tilev

Security Sales Leader Bulgaria and Romania

Page 2: Securing the threats of tomorrow, Today! Securing the threats of tomorrow, Today! 27 September 2018 Lubomir Tilev Security Sales Leader Bulgaria and Romania . 2 IBM Security Look familiar?

2 IBM Security

Look familiar?

Criminal detection

Fraud protection

Data access control

Application security management

Application scanning

Data protection

Device management Transaction protection

Content security

Malware protection

Endpoint detection and response

Endpoint patching and management

Network forensics and threat management

Virtual patching

Firewalls

Sandboxing

Network visibility and segmentation

Access management

Identity governance and administration

Privileged user management

IDaaS

Indicators of compromise

Malware analysis

Threat sharing

Vulnerability management

Security analytics

Threat and anomaly detection

Incident response

User behavior analytics

Threat hunting and investigation

Mainframe security

Page 3: Securing the threats of tomorrow, Today! Securing the threats of tomorrow, Today! 27 September 2018 Lubomir Tilev Security Sales Leader Bulgaria and Romania . 2 IBM Security Look familiar?

3 IBM Security

PROVE

COMPLIANCE

Transform Your

Security Program

STOP

THREATS

Build a

Cognitive SOC

GROW

BUSINESS

Secure digital

transformation

Get

Ahead of

Compliance

Enhance

Security

Hygiene

Govern

Users and

Identities

Detect & Stop

Advanced

Threats

Orchestrate Incident

Response

Master Threat Hunting

Secure Hybrid Cloud

Protect Critical Assets

Prevent Advanced

Fraud

OUTCOME-DRIVEN SECURITY

Page 4: Securing the threats of tomorrow, Today! Securing the threats of tomorrow, Today! 27 September 2018 Lubomir Tilev Security Sales Leader Bulgaria and Romania . 2 IBM Security Look familiar?

4 © 2018 IBM Corporation

Focus on regulatory compliance

Ensure workloads in the cloud meet new security standards

Increase investments for “right side of the boom”

Adopt standard security frameworks and controls

Design integrated risk, compliance and security analytics

Challenges we hear from the Financial Services Sector

4 © 2018 IBM Corporation

Page 5: Securing the threats of tomorrow, Today! Securing the threats of tomorrow, Today! 27 September 2018 Lubomir Tilev Security Sales Leader Bulgaria and Romania . 2 IBM Security Look familiar?

5 © 2018 IBM Corporation

Lack of sufficient skills and administration

Meet the demands of digital transformation

Ensure data privacy and compliance

Mitigate insider threats

Improve real-time visibility and continuous monitoring

Challenges we hear from Government Agencies

5 © 2018 IBM Corporation

Page 6: Securing the threats of tomorrow, Today! Securing the threats of tomorrow, Today! 27 September 2018 Lubomir Tilev Security Sales Leader Bulgaria and Romania . 2 IBM Security Look familiar?

6 © 2018 IBM Corporation

Address risks for IT, OT and IoT

Harmonize the approach to IT-OT convergence

Maintain regulatory compliance

Increase security efficiency for detection to response

Enable and protect digital transformation

Challenges we hear from CISOs in the Energy and Utility Industry

6 © 2018 IBM Corporation

Page 7: Securing the threats of tomorrow, Today! Securing the threats of tomorrow, Today! 27 September 2018 Lubomir Tilev Security Sales Leader Bulgaria and Romania . 2 IBM Security Look familiar?

7 IBM Security

PROVE

COMPLIANCE

Transform Your Security Program

STOP

THREATS

Build a Cognitive SOC

GROW

BUSINESS

Secure Digital Transformation

• Guardium

• AppScan / ASoC

• BigFix

• MaaS360

• Trusteer

• Cloud Identity

• QRadar

Detect & Stop

Advanced

Threats

• QRadar + Advisor

• QRadar UBA

• Resilient

• i2

• Identity Governance

• Access Manager / Cloud Identity

• Identity Governance

• Access Manager / Cloud Identity

• Guardium

• Data Risk Manager

• BigFix

• QRadar

Orchestrate Incident

Response

Get

Ahead of

Compliance

Enhance

Security

Hygiene

Govern

Users and

Identities

Master Threat

Hunting

Secure Hybrid Cloud

Protect Critical Assets

Prevent Advanced

Fraud

Outcome based security

Page 8: Securing the threats of tomorrow, Today! Securing the threats of tomorrow, Today! 27 September 2018 Lubomir Tilev Security Sales Leader Bulgaria and Romania . 2 IBM Security Look familiar?

8 IBM Security

Criminal detection

Fraud protection

Data access control

Application security management

Application scanning

Data protection

Device management

Transaction protection

Content security

Malware protection

Endpoint detection and response

Endpoint patching and management

Network forensics and threat management

Virtual patching

Firewalls

Sandboxing

Network visibility and segmentation

Access management

Identity governance and administration

Privileged user management

IDaaS

Mainframe security

Indicators of compromise

Malware analysis

Threat sharing

SECURITY ECOSYSTEM

SECURITY ORCHESTRATION

& ANALYTICS

DATA

APPS IDENTITY & ACCESS

MOBILE ADVANCED

FRAUD

THREAT INTEL

ENDPOINT NETWORK

Vulnerability management

Security analytics

Threat and anomaly detection

Incident response

User behavior analytics

Threat hunting and investigation

Page 9: Securing the threats of tomorrow, Today! Securing the threats of tomorrow, Today! 27 September 2018 Lubomir Tilev Security Sales Leader Bulgaria and Romania . 2 IBM Security Look familiar?

9 IBM Security

APP EXCHANGE (2015)

MAAS360

(2013)

TRUSTEER

(2014)

APP SECURITY

ON CLOUD

(2015)

CLOUD IDENTITY

(2017)

X-FORCE EXCHANGE (2015)

QRADAR ON CLOUD (2016)

WATSON FOR CYBER (2017)

DATA SECURITY ON CLOUD (2018)

ENDPOINT NETWORK

DATA

IDENTITY & ACCESS

MOBILE ADVANCED FRAUD

APPLICATIONS

SECURITY ANALYTICS

& ORCHESTRATION

THREAT INTELLIGENCE

SECURITY ECOSYSTEM

We are helping clients on their next journey…

Page 10: Securing the threats of tomorrow, Today! Securing the threats of tomorrow, Today! 27 September 2018 Lubomir Tilev Security Sales Leader Bulgaria and Romania . 2 IBM Security Look familiar?

10 IBM Security

IBM Security: Leader across 12 out of 12 security market segments

DOMAIN SEGMENT MARKET SEGMENT / REPORT ANALYST

RANKINGS

Security Operations and Response

Security Intelligence Security Information and Event Management (Qradar) LEADER

Network & Endpoint Protection Endpoint: Client Management Tools (BigFix) LEADER

Information Risk

and Protection

Identity Governance

& Access Management

Identity and Access Governance LEADER

Access Management (worldwide) LEADER

Identity and Access Management as a Service (IDaaS) LEADER

Identity Provisioning Management LEADER

Data Security Database Security (Guardium) LEADER

Application Security Application Security Testing (dynamic and static) LEADER

Mobile Protection Enterprise Mobility Management (MaaS360) LEADER

Fraud Protection Web Fraud Detection (Trusteer) LEADER

Security

Transformation

Services

Consulting and

Managed Services

Managed Security Services (MSS) LEADER

Information Security Consulting Services LEADER

Note: This is a collective view of analyst reports from Gartner, Forrester, IDC, Frost & Sullivan, Ovum, and KuppingerCole.

compiled as of November 2017

Page 11: Securing the threats of tomorrow, Today! Securing the threats of tomorrow, Today! 27 September 2018 Lubomir Tilev Security Sales Leader Bulgaria and Romania . 2 IBM Security Look familiar?

11 IBM Security

Open partner ecosystem 200+ ecosystem partners, 500+ QRadar integrations

… …

Page 12: Securing the threats of tomorrow, Today! Securing the threats of tomorrow, Today! 27 September 2018 Lubomir Tilev Security Sales Leader Bulgaria and Romania . 2 IBM Security Look familiar?

ibm.com/security

securityintelligence.com

xforce.ibmcloud.com

@ibmsecurity

youtube/user/ibmsecuritysolutions

© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,

express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products

and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service

marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your

enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.

No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,

products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products

or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.

FOLLOW US ON:

THANK YOU